Authenticated Group Communication to Mitigate Collusion Attack in Key Sharing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack on Two ID-based Authenticated Group Key Agreement Schemes

Authenticated group key agreement problem is important in many modern collaborative and distributed applications. Recently, there are two ID-based authenticated group key agreement schemes have been proposed, one is Choi et al.’s [2] scheme, the other is Du et al.’s [3] scheme. They are all constructed from bilinear pairings based on Burmester and Desmedt scheme [1]. In this paper, we propose a...

متن کامل

Stochastic Market Sharing, Partial Communication and Collusion

This paper analyzes the role of communication between firms in an infinitely repeated Bertrand game in which firms receive an imperfect private signal of a common value i.i.d. demand shock. It is shown that firms can use stochastic, inter-temporal market sharing as a perfect substitute for communication in low demand states. Therefore, partial communication in high demand states is sufficient t...

متن کامل

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks

We explore authenticated group key agreement in data-sharing Peer-to-Peer networks. We first propose a novel password-based authenticated group key agreement protocol with key confirmation. We present a formal statement of its security in a variant of the Bresson et al. security model adapted for the password-based setting. A discussion of the limitations of our protocol in the case where the g...

متن کامل

Dynamic Authenticated Secure Group Communication

Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issue in Secure Group communication. We develop a protocol for Secure Authentic Communication where we address authentication for the group communication scheme proposed by Blundo et al. which only provides confidentiality. Authentication scheme used is a multiparty authentic...

متن کامل

Secure Key Sharing for Group Communication under Community Cloud

The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In our modern world people join hands together to form groups and that forms communities through which the ability of one can enhance by communicating with others. In order to satisfy these peo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2012

ISSN: 1812-5638

DOI: 10.3923/itj.2013.28.39